CVE-2018-10350
Trend Micro Smart Protection Server BWListMgmt SQL Injection Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A SQL injection remote code execution vulnerability in Trend Micro Smart Protection Server (Standalone) 3.x could allow a remote attacker to execute arbitrary code on vulnerable installations due to a flaw within the handling of parameters provided to wcs\_bwlists\_handler.php. Authentication is required in order to exploit this vulnerability.
Una vulnerabilidad de ejecución remota de código por inyección SQL en Trend Micro Smart Protection Server (Standalone) 3.x podría permitir que un atacante remoto ejecute código arbitrario en instalaciones vulnerables debido a un error en la gestión de parámetros proporcionados a wcs\_bwlists\_handler.php. Se requiere autenticación para explotar esta vulnerabilidad.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro Smart Protection Server. Authentication is required to exploit this vulnerability.
The specific flaw exists within the handling of parameters provided to wcs\_bwlists\_handler.php. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to remotely execute code under the context of webserv.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-04-24 CVE Reserved
- 2018-05-04 CVE Published
- 2024-08-05 CVE Updated
- 2024-11-18 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-18-421 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://success.trendmicro.com/solution/1119715 | 2018-06-25 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Trendmicro Search vendor "Trendmicro" | Smart Protection Server Search vendor "Trendmicro" for product "Smart Protection Server" | 3.0 Search vendor "Trendmicro" for product "Smart Protection Server" and version "3.0" | - |
Affected
| in | Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | - | - |
Safe
|
Trendmicro Search vendor "Trendmicro" | Smart Protection Server Search vendor "Trendmicro" for product "Smart Protection Server" | 3.1 Search vendor "Trendmicro" for product "Smart Protection Server" and version "3.1" | - |
Affected
| in | Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | - | - |
Safe
|
Trendmicro Search vendor "Trendmicro" | Smart Protection Server Search vendor "Trendmicro" for product "Smart Protection Server" | 3.2 Search vendor "Trendmicro" for product "Smart Protection Server" and version "3.2" | - |
Affected
| in | Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | - | - |
Safe
|
Trendmicro Search vendor "Trendmicro" | Smart Protection Server Search vendor "Trendmicro" for product "Smart Protection Server" | 3.3 Search vendor "Trendmicro" for product "Smart Protection Server" and version "3.3" | - |
Affected
| in | Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | - | - |
Safe
|